Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Receivers
biblio
A High-Speed Key Management Method for Quantum Key Distribution Network
Submitted by grigby1 on Mon, 01/27/2020 - 12:27pm
quantum key distribution network
one-time pad tunnel manager
Photonics
private key cryptography
pubcrawl
public key cryptography
QKD key generation
QKD network
quantum cryptography
Quantum Key Distribution
one-time pad
Receivers
resilience
Resiliency
Scalability
secure communication
transparent encryption link
unconditional secure communication
Web API
high-speed key management method
application communication
application key consumption
application program interfaces
data communication
eavesdropping
encryption
encryption key sharing
global key manager
adjacent nodes
high-speed method
high-speed QKD system
Human behavior
Human Factors
key management
local key manager
Metrics
network systems
biblio
Bootstrapping Accountability and Privacy to IPv6 Internet without Starting from Scratch
Submitted by grigby1 on Tue, 01/21/2020 - 12:08pm
large-scale modifications
unsatisfactory deployability
Resiliency
resilience
Receivers
pubcrawl
Protocols
private proposal
privacy
policy-based governance
Payloads
PAVI prototype
Observers
network accountability
Metrics
accountability
ipv6 security
IPv6 Internet
IPv6
IP networks
internet
data privacy
computer network security
composability
communication identifiers
collaboration
bootstrapping privacy
bootstrapping accountability
authentication
accountable proposal
biblio
Wideband Electromagnetic Dynamic Acoustic Transducer as a Standard Acoustic Source for Air-coupled Ultrasonic Sensors
Submitted by aekwall on Mon, 01/13/2020 - 12:07pm
Scalability
Receivers
Resiliency
Human behavior
pubcrawl
sensors
Transmitters
Acoustics
acoustic source
air-coupled ultrasonic measurement
flexural ultrasonic transducer
microphones
Wideband
wideband electromagnetic dynamic acoustic transducer
acoustic coupling
biblio
Double Encryption Using TEA and DNA
Submitted by grigby1 on Tue, 01/07/2020 - 10:51am
Ciphers
TEA
secure network communication
passive attacks
Double encryption
data intruders
active attacks
active and passive attacks
decryption time
Resiliency
cryptographic algorithms
DNA
privacy
digital signatures
Data Security
Receivers
Data Transmission
information security
Cryptography
encryption
Metrics
Human behavior
pubcrawl
resilience
biblio
A Dynamic DNA for Key-Based Cryptography
Submitted by grigby1 on Tue, 01/07/2020 - 10:50am
geographical cryptography
traditional cryptographic approaches
text file
Resiliency
resilience
Reliability
Receivers
quantum cryptography
pubcrawl
privacy
plain text characters
Metrics
key-based cryptography
image file
Human behavior
audio file
encryption
encoding
effective cryptographic systems
dynamic DNA
DNA sequences
DNA digital coding
DNA cryptography
DNA
decryption
Cryptography
Ciphers
biometrics (access control)
biometric cryptography
biocomputing
biblio
An Anonymous Routing Scheme for Preserving Location Privacy in Wireless Sensor Networks
Submitted by grigby1 on Mon, 12/16/2019 - 3:53pm
routing branch
location security
privacy
proxy source node
pubcrawl
Receivers
resilience
Resiliency
Routing
location privacy
Scalability
security
synchronisation
telecommunication network routing
telecommunication security
telecommunication traffic
traffic consumption
wireless sensor networks
Control Theory
Metrics
Location Privacy in Wireless Networks
anonymous routing
anonymous routing strategy for preserving location privacy
ARPLP
base station
Base stations
communication delay
Compositionality
cryptography theory
Cyber Physical System
cyber physical systems
data privacy
energy consumption
Energy Efficiency
Human behavior
location information
biblio
RSS-Based Localization with Maximum Likelihood Estimation for PUE Attacker Detection in Cognitive Radio Networks
Submitted by grigby1 on Thu, 12/05/2019 - 10:55am
pubcrawl
wireless channels
Transmitters
telecommunication security
Signal to noise ratio
RSS-based localization method
RSS-based localization
Resiliency
resilience
Receivers
radiofrequency interference
radio spectrum management
PUE attacker detection
cognitive radio
primary user signals
primary user emulation attacker
primary user emulation attack
mobile users
mobile radio
maximum likelihood estimation
Mathematical model
licensed users
emulation
cognitive radio technology
Cognitive Radio Security
cognitive radio networks
biblio
Secure Physical Layer Network Coding versus Secure Network Coding
Submitted by grigby1 on Thu, 12/05/2019 - 10:47am
Physical layer
telecommunication security
Task Analysis
Silicon
security
secure physical layer network coding
secure communication
secrecy analysis
Resiliency
resilience
Receivers
pubcrawl
Predictive Metrics
physical layer security
coding theory
noisy channel
noiseless network
Noise measurement
network coding
Metrics
forward error correction
error correction codes
error correction
cyber physical systems
Cryptography
computation and forward
Compositionality
composability
biblio
Frozen Bit Selection Scheme for Polar Coding Combined with Physical Layer Security
Submitted by grigby1 on Wed, 11/27/2019 - 3:01pm
Metrics
wiretap channel
telecommunication security
symmetric α-stable distribution
security
secrecy rate
Resiliency
resilience
Receivers
pubcrawl
Protocols
polar coding scheme
polar codes
physical layer security
channel coding
legitimate users
impulsive noise
frozen bit selection scheme
frozen bit
error statistics
eavesdropper
density evolution
Decoding
composability
bit-error rate
BER
Automatic repeat request
ARQ protocol
biblio
Secure speech communication system based on scrambling and masking by chaotic maps
Submitted by aekwall on Mon, 11/25/2019 - 2:09pm
chaotic encryption
two encryption levels
SSSNR
speech processing
signal denoising
secure speech communication system
scrambling
public channels
MatLab simulation
masking
communication security
Chaotic systems
chaotic scrambling and masking
chaotic scrambling
chaotic masking
Chaotic maps
Cryptography
channel problems
Transmitters
chaotic cryptography
chaotic communication
Predictive Metrics
Synchronization
synchronisation
composability
pubcrawl
Resiliency
information security
telecommunication security
Receivers
encryption
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
…
next ›
last »